Skip to main content

About your Search

20130201
20130228
Search Results 0 to 3 of about 4 (some duplicates have been removed)
and the also is being investigated by a u.s. attorney and at least one doctor is under criminal investigation for fraud. never before seen letters written by john lennon's killer giving a chilling look into his deranged mind. in the lowers, mark david chapman asked the officer who arrested him to be his friend. chapman says he felt close to him and even asked the officer to help find his copy of "catcher in the rye" taken away from the scene of the crime when chapman was arrested. about to go on sale to the public for $75 grand. chapman 20 years to life for lennon's murder and denied parole several times. a mom in gilbert, arizona outraged over what she says was an inappropriate homework assignment about fidelity. the fourth grader had to write about what was happening. and the doctor comes the question about a wife finding a hair clip underer her bed with another parent in it. after the parent called the school, the teacher apologized and said she hadn't read this beforehanding it out to students. >> tucker: can you imagine? >> unbelievable. how about this, a new book is out looking basicall
into u.s. corporations hundreds of times and stealing secrets. so if those companies can't protect themselves, how can you? and a cyber security analyst cbo connected to the case, he joins us now, hi, morgan. >> hi, alisyn. >> alisyn: that's a great question. obviously, the chinese are using, i assume, some sort of sophisticated technology to hack into the department of defense or to try to. and various corporations, computer systems, but can we assume that lower level criminals are taking a page from them? >> well, actually, alisyn, let's back up. they're actually not using sophisticated systems, what they're using curiosity, social engineering. the big s method of intrusion and the way that they're compromising system is getting you to click on an attachment on an e-mail you think you have a personal interest in. that's where the foot hold starts because the code to infect your computer comes out of that pdf or that document file or attachment. >> alisyn: good to know. talk about we, even us who are not technically sophisticated the at all can protect ourselves. >> yes he. >> ali
Search Results 0 to 3 of about 4 (some duplicates have been removed)

Terms of Use (31 Dec 2014)